March 15, 2023, 12:05 a.m. | aeneas

Hacker Noon - cybersecurity hackernoon.com

OAuth2 and OpenID Connect are powerful protocols when used correctly. When used in the wrong context - which often is the case - it can lead to serious security vulnerabilities. There are two primary use cases where you are implementing OAuth2/OpenID Connect, and that this article only covers one of them.

Read All

article authentication case cases connect context cyber security cybersecurity don oauth oauth2 openid openid connect ory protocols security serious use cases vulnerabilities

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Level 1 SOC Analyst

@ Telefonica Tech | Dublin, Ireland

Specialist, Database Security

@ OP Financial Group | Helsinki, FI

Senior Manager, Cyber Offensive Security

@ Edwards Lifesciences | Poland-Remote

Information System Security Officer

@ Booz Allen Hamilton | USA, AL, Huntsville (4200 Rideout Rd SW)

Senior Security Analyst - Protective Security (Open to remote across ANZ)

@ Canva | Sydney, Australia